-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add OpenVINO as a Backend to AIPG #195
Conversation
Refs: #50 Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
Refs: #50 Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
Refs: #50 Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
Refs: #50 Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
Refs: #50 Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
def __calculate_md5(self, file_path: str) -> str: | ||
import hashlib | ||
|
||
hasher = hashlib.md5() |
Check warning
Code scanning / Bandit
Use of insecure MD2, MD4, MD5, or SHA1 hash function. Warning
"enable_rag": False, | ||
"model_repo_id": "meta-llama-3.1-8b-instruct-q5_k_m.gguf", | ||
} | ||
response = requests.post(url, json=params, stream=True) |
Check warning
Code scanning / Bandit
Call to requests without timeout Warning
Signed-off-by: Markus Schuettler <markus.schuettler@tngtech.com>
def __calculate_md5(self, file_path: str) -> str: | ||
import hashlib | ||
|
||
hasher = hashlib.md5() |
Check failure
Code scanning / Trivy
transformers: Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability High
Installed Version: 4.39.0
Vulnerability CVE-2024-11392
Severity: HIGH
Fixed Version: 4.48.0
Link: CVE-2024-11392
"enable_rag": False, | ||
"model_repo_id": "meta-llama-3.1-8b-instruct-q5_k_m.gguf", | ||
} | ||
response = requests.post(url, json=params, stream=True) |
Check failure
Code scanning / Trivy
transformers: Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability High
Installed Version: 4.39.0
Vulnerability CVE-2024-11393
Severity: HIGH
Fixed Version: 4.48.0
Link: CVE-2024-11393
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Description:
This PR adds OpenVINO GenAI as a backend to AI Playground
Changes Made:
Testing Done:
Tested locally on B580
Screenshots:
Checklist: